EC-Council Certified Incident Handler

Handle and Respond to Incidents
Level IV - Specialist

cover

Course Description

E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident.

These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

This program addresses all the stages involved in incident handling and the response process to enhances your skills as an incident handler and responder, increasing your employability.

This approach makes E|CIH one of the most comprehensive incident handling and response related certifications on the market today.

The skills taught in EC-Council’s E|CIH program are desired by cybersecurity professionals from around the world and is respected by employers.

Who Should Attend

The course is suitable for experienced cybersecurity professionals, such as: incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals and anyone who is interested in incident handling and response

ECIH Course – EC-Council Certified Incident Handler

  • Module 01: Introduction to Incident Handling and Response
  • Module 02: Incident Handling and Response Process
  • Module 03: Forensic Readiness and First Response
  • Module 04: Handling and Responding to Malware Incidents
  • Module 05: Handling and Responding to Email Security Incidents
  • Module 06: Handling and Responding to Network Security Incidents
  • Module 07: Handling and Responding to Web Application Security Incidents
  • Module 08: Handling and Responding to Cloud Security Incidents
  • Module 09: Handling and Responding to Insider Threats
  • Module 10: Handling and Responding to Endpoint Security Incidents